6,495 views
0 votes
0 votes
Q1 one of the following is not the type of active attack

A. Denial of services

B  Masquerades

C. Fabrication

D.  Traffic analysis

if possible try to explain each option i tried to read it from wiki but didn't get more clarity

2 Answers

0 votes
0 votes
Traffic analysis is not an active attack.

Denial of services refers to making the data inaccessible or unavailable.

Masquerade uses fake identity either to gain information or pretends to be someone other and send information

Fabrication means inserting fabricated data along with authentic data.

However traffic analysis monitors networks and sometimes scans for open ports and vulnerabilities. The purpose is to gain information about the target and no data is changed.

Since no harm to data is caused, traffic analysis is a passive attack.
0 votes
0 votes

option(D) is correct.traffic analysis is not a active attack ,it is a passive attack

we know that passive attack is that which can use the information of other system but does not affect the resources .on the other hand active attack make use of other system's information and it affects or alter the system resources.

(A)-Denial of service-It prevents or inhibits the normal use or management of communications facilities. This attack may have a specific target;

Ex. An entity may suppress all messages directed to a particular destination. (e.g The security audit service) Another form of service denial is the disruption of an entire network, either by disabling the network or by overloading it with messages so as to degrade performance.

Figure 4.6 Denial of Service

(B) Masquerades-it takes place when one entity pretends to be different entity.

E.g. Authentication sequences can be captured and replayed after a valid authentication sequences has taken place, thus enabling an authorized entity with few privileges to obtain extra privileges by interpersonating an entity that has those privileges.

Figure 4.3 Masquerade

(C)fabrication- In this type of attack a fake message is inserted into the network by an unauthorized user as if it is a valid user. This results in the loss of confidentiality, authenticity and integrity of the message.

(D) traffic analysis-it is a phenomenon in which when a sender sends some information to some receiver then in between them analyzing the pattern of message(information) from sender to receiver is called traffic analysis. It does not alter the system resources.

Related questions

0 votes
0 votes
1 answer
2
Akriti sood asked Jan 4, 2017
741 views
if suppose transmission time for sending frame is Tthen if we want to send a window of size 3 i.e 3 frames simultaneously,will it b still T or 3*T??///it might be a silly...
1 votes
1 votes
1 answer
3
Hradesh patel asked Dec 27, 2017
237 views
i am little bit confuse because of they given 7 bit or N=7 plz explain?//
1 votes
1 votes
0 answers
4
Hradesh patel asked Dec 27, 2017
155 views
plz explain ??